Analysis
-
max time kernel
1800s -
max time network
1694s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2023 05:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://163.123.142.146
Resource
win10v2004-20230220-en
General
-
Target
http://163.123.142.146
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133306760064772727" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe Token: SeShutdownPrivilege 4848 chrome.exe Token: SeCreatePagefilePrivilege 4848 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 3776 4848 chrome.exe 83 PID 4848 wrote to memory of 3776 4848 chrome.exe 83 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 2140 4848 chrome.exe 85 PID 4848 wrote to memory of 1488 4848 chrome.exe 86 PID 4848 wrote to memory of 1488 4848 chrome.exe 86 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87 PID 4848 wrote to memory of 4816 4848 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://163.123.142.1461⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d37f9758,0x7ff9d37f9768,0x7ff9d37f97782⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 --field-trial-handle=1848,i,52106437819040603,15708316785075084461,131072 /prefetch:22⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1848,i,52106437819040603,15708316785075084461,131072 /prefetch:82⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1848,i,52106437819040603,15708316785075084461,131072 /prefetch:82⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1848,i,52106437819040603,15708316785075084461,131072 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1848,i,52106437819040603,15708316785075084461,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1848,i,52106437819040603,15708316785075084461,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1848,i,52106437819040603,15708316785075084461,131072 /prefetch:82⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2876 --field-trial-handle=1848,i,52106437819040603,15708316785075084461,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54cdd87735bfa148f1aa1884d98cd1996
SHA111189059a7ddf0b8dcc674e3f672c92fb9ccdf67
SHA256478a1bdb0bf75db7f61888704c445fe28bfc0ae182929398c01e640b91ff8894
SHA5127a10067699eb8437afa4f15bb2b7059907423b98d9382106c521ac993393f55c1d756d0ecca5f0b6fac870b6ada76b21813e2a0a7850692f71995f159608a542
-
Filesize
4KB
MD5163f81c10bff9d28fca21e851df3d3d6
SHA1ebc2e77d214217df978d0284664767796331946c
SHA25669afd0732b9b8bc1b050c911c20d58697ae50b5e722271ceebcfcd87f8bbfb46
SHA512ae9ba6ad40e85b2f6e4a3ec92068d322d99bc7c189c95732b864f5851bea7cd89544d5af380f3ab0871850f8a79e8c062efef3eddc9fd0689b5d6268d366f1b8
-
Filesize
4KB
MD5ca7baea8af9447f08c81d9743cf186a7
SHA169a23ed10159c484def37adea97f6d4973a1a6be
SHA256da136ffef510a8f60b4b90da1aaa29da99996f1baa1ed984c38d95a9cdb95ca7
SHA5126bebc614dbc6d8981a117e7ebd5ee8d4f22be9f8fff2bd9564912db700ecab74d290b7ac06d5af79d3c09c7c4d7705025ea007d6ebd2ecce5058d56caaaba9ea
-
Filesize
4KB
MD5be532c036161434df3c084edf5803ecd
SHA16ba12b71e7ded22502783f5805133b4750b220f3
SHA256c2dc33d5373f6200f8995db6f6ba16a3fa142eeee1f61bb762c9842ddd54b14a
SHA51295a573501ed47f217188a6cd72ec76230cd63a667755f8a73c3a84194ccb9698270b651735f3c44a0fc23bbc5da3a68544c96dc7659ebde288a7870df213d833
-
Filesize
158KB
MD50b8e6392f0ba69edf7025acf583aee0b
SHA10cf13fe2caac84f670c7485a095cc8223c993a50
SHA25665997782fa4237a05d12d474afc4f9f59617a72119f8efe24d055ceebf6bfd53
SHA51293efad638fb34905d8b0394f12572e02b59259a1b7749670da8d773233754b05a588da4ac1d59f9c2dfcb46d2274e8ea68f478312dfd340ed57998db050c4060